General
-
Target
c3aaf13e00b2fa20b47d40d2a3a761e9
-
Size
2.9MB
-
Sample
231228-e64k8aacen
-
MD5
c3aaf13e00b2fa20b47d40d2a3a761e9
-
SHA1
a5e6edb17f2fb8b3818e70475aa644ca1589e672
-
SHA256
e4e17547eda5ad55ec2da710928f2c766c369ef5612f73a18d5049d53dd882f4
-
SHA512
48e9fd927ded8b2b855ac2628a05154e9fac264c1cc450ed3be33d45ca5449f17a57e81f2d8fa89cbcabf61171c1f9b53619aa9484b31ba97ed78a5f273cafbd
-
SSDEEP
49152:CrR+n6HfwpFlN8V6Mkcj12PF1XmtBALZQynwu576ZtTBPo54:0+04pFT8tLMN1XoZAwrDQ54
Static task
static1
Behavioral task
behavioral1
Sample
c3aaf13e00b2fa20b47d40d2a3a761e9.exe
Resource
win7-20231215-en
Malware Config
Extracted
vidar
39.7
973
https://shpak125.tumblr.com/
-
profile_id
973
Targets
-
-
Target
c3aaf13e00b2fa20b47d40d2a3a761e9
-
Size
2.9MB
-
MD5
c3aaf13e00b2fa20b47d40d2a3a761e9
-
SHA1
a5e6edb17f2fb8b3818e70475aa644ca1589e672
-
SHA256
e4e17547eda5ad55ec2da710928f2c766c369ef5612f73a18d5049d53dd882f4
-
SHA512
48e9fd927ded8b2b855ac2628a05154e9fac264c1cc450ed3be33d45ca5449f17a57e81f2d8fa89cbcabf61171c1f9b53619aa9484b31ba97ed78a5f273cafbd
-
SSDEEP
49152:CrR+n6HfwpFlN8V6Mkcj12PF1XmtBALZQynwu576ZtTBPo54:0+04pFT8tLMN1XoZAwrDQ54
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Vidar Stealer
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-